Login / Signup

Security study on three modes of connection for a connected car.

Jellid KawtarTomader Mazri
Published in: SCA (2018)
Keyphrases
  • statistical analysis
  • empirical studies
  • theoretical framework
  • real time
  • electronic commerce
  • experimental study
  • hong kong
  • security policies
  • security requirements
  • computer security